1. My "port-mirroring" is based on libpcap, it does have ipv6 support.
2. Different to the "TEE" target, "port-mirroring" encapsulates a whole
packet including ethernet headers using TSZP protocol
http://en.wikipedia.org/wiki/TZSP. However, "TEE" modifies the original
packet's ethernet headers to forward it, hence you can not get the original
mac addresses.


On Tue, Mar 19, 2013 at 9:44 PM, Stefan Hellermann <ste...@the2masters.de>wrote:

> 2013/3/19 Wei Geng <gengw2...@gmail.com>:
> > This "port-mirroring" package can mirror traffic of adapter(s) to another
> > adapter or to a remote computer, which is useful for a network sniffer
> > to analysis your network.
>
> What's the difference to the netfilter TEE target? In the
> configuration I can see a target IP address, is the destination of
> every packet mangled? IPv6? Is it possible to route the mirrored
> traffic? This is not possible with the netfilter TEE target.
> Or do you resolv the target IP to a MAC-Address and copy every packet
> to this Layer-2 address?
> I think it's important to highlight the differences to netfilter TEE.
>
> Regards,
> Stefan Hellermann
> _______________________________________________
> openwrt-devel mailing list
> openwrt-devel@lists.openwrt.org
> https://lists.openwrt.org/mailman/listinfo/openwrt-devel
>
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to